Data extortion

Page 1

FORESEC

WHAT IS IT ?

RANSOMWARE

15%

25%

VICTIMISED COUNTRIES TOP 5

SEX RANSOM

1000> cases

25%

921 cases

BANKING FRAUD

500 cases

SINGAPORE INDONESIA

5%

MALAYSIA

VENDETTA

However, identification and arrest of cyberextortionists are low because they usually operate from countries other than those of their victims and use anonymous accounts and fake e-mail addresses.

30%

A website, email server or computer system may be subjected to repeated denial of service by malicious attackers, who demand money in return for promising to stop the attacks. In recent years, cybercriminals have developed ransomware that can be used to encrypt the victim’s data. The attacker then demands money for the decryption key. Since majority of business enterprises are using Internet for their business, opportunities for cyberextortionists have exploded.

INCIDENTS 2014

PHISHING

Cyberextortion is a form of online crime which occurs when a person uses the Internet to demand money or other goods or behavior (such as sex), from another person by threatening to inflict harm to his person, his reputation, or his property. There are various forms of cyberextortion. Originally, denial of service (DoS) attacks were the most common method used by cyberextortionists.

TYPES OF

AUSTRALIA NEW ZEALAND 800 cases

850 cases SOURCE : INDIPENDANT SURVEY ON SECURITY INCIDNETS FROM CERT ASIA AND USA FOR ASIA PACIFIC REGION


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Data extortion by Desmond Devendran - Issuu